关注
Zhenzhen Bao
标题
引用次数
年份
A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT
W Zhang, Z Bao, V Rijmen, M Liu
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
492015
An Algorithm for Counting the Number of -Periodic Binary Sequences with Fixed -Error Linear Complexity
W Pan, Z Bao, D Lin, F Liu
Cryptology ePrint Archive, 2016
2016
Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers
Z Xiang, W Zhang, Z Bao, D Lin
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
3402016
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
Z Bao, X Dong, J Guo, Z Li, D Shi, S Sun, X Wang
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
382021
Bitsliced implementations of the PRINCE, LED and RECTANGLE block ciphers on AVR 8-bit microcontrollers
Z Bao, P Luo, D Lin
Information and Communications Security: 17th International Conference …, 2016
182016
Conditional Differential-Neural Cryptanalysis.
Z Bao, J Guo, M Liu, L Ma, Y Tu
IACR Cryptol. ePrint Arch. 2021, 719, 2021
38*2021
Differential-linear approximation semi-unconstrained searching and partition tree: Application to lea and speck
Y Chen, Z Bao, H Yu
International Conference on the Theory and Application of Cryptology and …, 2023
12023
Evaluating the security of Merkle-Damgård hash functions and combiners in quantum settings
Z Bao, J Guo, S Li, P Pham
International Conference on Network and System Security, 687-711, 2022
42022
Extended Expectation Cryptanalysis on Round-reduced AES.
Z Bao, J Guo, E List
IACR Cryptol. ePrint Arch. 2019, 622, 2019
42019
Extended truncated-differential distinguishers on round-reduced AES
Z Bao, J Guo, E List
Cryptology ePrint Archive, 2019
142019
Functional graph revisited: Updates on (second) preimage attacks on hash combiners
Z Bao, L Wang, J Guo, D Gu
Annual International Cryptology Conference, 404-427, 2017
122017
Functional graphs and their applications in generic attacks on iterated hash constructions
Z Bao, J Guo, L Wang
Cryptology ePrint Archive, 2018
72018
Generic attacks on hash combiners
Z Bao, I Dinur, J Guo, G Leurent, L Wang
Journal of Cryptology 33 (3), 742-823, 2020
102020
Improved meet-in-the-middle preimage attacks against AES hashing modes
Z Bao, L Ding, J Guo, H Wang, W Zhang
IACR Transactions on Symmetric Cryptology, 318-347, 2019
152019
KNOT: algorithm specifications and supporting document
W Zhang, T Ding, B Yang, Z Bao, Z Xiang, F Ji, X Zhao
Submission to NIST lightweight cryptography project, 2019
192019
More insight on deep learning-aided cryptanalysis
Z Bao, J Lu, Y Yao, L Zhang
International Conference on the Theory and Application of Cryptology and …, 2023
52023
Optimizing implementations of linear layers
Z Xiang, X Zeng, D Lin, Z Bao, S Zhang
IACR Transactions on Symmetric Cryptology, 2020
602020
PEIGEN–a platform for evaluation, implementation, and generation of S-boxes
Y Sasaki, S Ling, J Guo, Z Bao
502019
PHOTON-beetle authenticated encryption and hash family
Z Bao, A Chakraborti, N Datta, J Guo, M Nandi, T Peyrin, K Yasuda
NIST Lightweight Compet. Round 1, 115, 2019
642019
Quantum multi-collision distinguishers
Z Bao, J Guo, S Li, P Pham
Cryptology ePrint Archive, 2021
52021
系统目前无法执行此操作,请稍后再试。
文章 1–20